Related Articles

Computer Questions and Answers for IT Officers/IBPS Bank Exams-2016

Computer Awareness (IT Officers Professional Knowledge) plays a very crucial role to get the good score in IBPS IT Officers Exams. Although, the applicants are from computer background they need to concentrate more on this section to get the good score. Because In IT Officers Exam we get 50 questions from professional knowledge of IT Officers and totally for 75 marks and there is negative marks concept and also, the accuracy of right answers is also important. So, while attempting the exam, we have to keep in mind about negative marks and accuracy of right answers. Here we are providing some important Computer Questions and Answers for IT Officers Exam – 2016.

IT Officers Exam Pattern -2016

S.No.

Test Name

Questions

Marks Allotted

Total Time

1

English

50

25

120 minutes

or

2 hours

2

Professional Knowledge

50

75

3

Reasoning

50

50

4

Quantitative Aptitude

50

50

Total

200 Qs

200 mark

Which of the given options is not a web server?

Apache

IIS

Jigsaw

Zibo

Which of the following is the first web-based e-mail service?

Hotmail

Gmail

Yahoo Mail

Rediff Mail

Who is known as the father of java programming language?

James Gosling

James Smith

Saber Bhatia

Bill Board.

The amount of time that a unique user interacts with a web application is known as ……………….

Application

Session

Cookie

None of these.

Encryption is primarily being used with ………………………..

Transaction Entry

File Retention

Computer Processing

Data Communication.

Memory management is the feature of …………………..

Processor

Operating System

MS Word

Animation

Toolbar Displays …..

Collection of menu item

Collection of buttons

One single menu item

None of these

A person who is responsible for the development of the new product (such as instant coffee) in affirming is called a ……………..

Development manager

Project manager

Brand manager

Market manager

None

9. ………………. Is the part of OLE growth curve?

Active X

OLE controls

Direct X

All of these

10.In computer terminology, ‘.tmp’ extension refers usually to the ……………………..

Image file.

Temporary file.

Video file

Text file

11.A popular technique for forecasting is ………………………

Regression analysis

Correlation analysis

Monte Carlo

Waterfall model

12. In E-mail BCC means …………

Black carbon copy

Blind carbon copy

Batch computer copy

Business carbon copy

13. A key verifier machine which is used for controlling ……………..

Transaction entry

Data communication

Transaction Organization

Computer processing.

None of these

14. While using e-cash, a customer’s digital signature is done by using …..

Customer public key

Vendor’s public key

Bank’s private key

customer private key

15. .WAV file format is associated …………………… files.

Sound

Video

Image

Log file.

16. The compiler is an example of …………. type of software.

An application software

Programming tool.

A System software

Testing tool.

17. Machine language is also known as …………………..

High-level language

Source code

Low-level language

Assembly language

18. The file created yesterday is referred as the ……………………..

Son file.

father file

grandfather file

mother file

19. The …………………… file which can includes some music?

.wav

pdf

doc

jpeg.

20. The post installation audit seeks to assure that ………………..

The system is accurate and secure.

Manager information needs are being met.

Both (A) and (B)

None of the above.

21. Which of the following is responsible for the management and coordination of activities and the sharing of the resources of the computer?

36. A mobile phone that, apart from making calls has a camera, surfs the net, sends e-mails, play digital music has a calendar and many additional options is the smartphone. These smartphones use which of the following platforms?

a) Symbian operating system

b) Windows smartphone

c) Both (A) and (B)

d) None of those.

37. Once a bad frame is received, the frame relay service can?

a) Simply get it and send an acknowledgment.

b)Simply discard it

c) Provide acknowledgment

d) None

38. The ATM layer in ATM technology deals with ………..

a) Voltages

b) Reassembly of packets

c) Bit timings

d)Cell transport.

39. Which of the subsequent feature does not belong to the frame relay?

a) Multiprogramming

b) Multicasting

c) Normal Speed 1-5 Mbps

d) Maximum payload is 1600.

40. Which technology is deployed for mobile internet solutions?

a) TCP (Transfer Control Protocol)

b) CIDR (Cell Inter-Domain Routing)

c)CDMA (Code Division Multiple Access)

d) CVDT (Cell Variation Delay tolerance).

41.In recent years has been deployed to provide IP connectivity to GSM users ……

a) GPRS (General Packet Radio Service)

b) ATM (asynchronous Transfer Mode)

c) LANs (Local Area Network)

d)TCP (Transfer Control Protocol)

42. A video editing system for Linux …………

a) VSL

b) LVS

c)LIVES

d)LIV

43. A flip-flop is a …………….. The element that stores a binary digit as a low or high voltage.

a) Chip

b)Memory

c) I/O

d)

44. Computers use thousands of flip-flops. To coordinate the overall action, a standard signal known as the ………………. is distributed to every flip-flop.

a) Latch

b) Master

c)Clock

d)

45. Which of the following operations is independent however not associative?

a) AND

b)NAND

c) OR

d) XOR

46. The data in ROM is stored …………….

a) By the user any no. of times

b)By the manufacturer during the fabrication of the device

c) By the user using ultraviolet light

d)

47. Dynamic RAM consumes ………… power and is ……………… then the static RAM.

a) Less, slower

b) Less, faster

c) More, slower

d) More, faster.

48. The binary equivalent of the decimal number 368 is …………..

a) 110110000

b) 111010000

c) 111100000

d) 101110000

49. An assembler that runs on one machine, however, produces machine code for another machine is named …………..

a) Simulator

b) Emulator

c) Cross-assembler

d) Bootstrap loader

50. The first OS (Operating System) used in microprocessors is ……………..

a) Zenix

b) DOS

c) CPIM

d) Mac

51. Exception handling is targeted at ………… error.

a) Logical

b) Compile Time

c) Runtime

d) All of those.

52.The amount of uncertainty in a system of symbol is termed ………….

a) Bandwidth

b) Entropy

c) Loss

d) Quantum

53. All the parts of the computer talk to each other by sending ………….

a) Analog signals

b) Digital signals

c) Smoothly varying signal waves

d) Both (B) and (C).

54. The speed of the cable modem connection varies based on the ………..

a) Type of connection used

b) Distance from Phone Company

c) Number of users online

d) CPU speed.

55. Which of the following protects a computer or network from intruders?